2015 10th International Conference on Availability, Reliability and Security 2015
DOI: 10.1109/ares.2015.97
|View full text |Cite
|
Sign up to set email alerts
|

An Active Testing Tool for Security Testing of Distributed Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 14 publications
0
3
0
1
Order By: Relevance
“…Few studies were classified as Experimental Study, Proof of Concepts and Theoretical, representing, respectively, 9.2% (8), 3.45% (3) and 4.6% (4). From the perspective of MBT activities, the most researched MBT activity of the primary studies [27] Gherkin language [68] predicate/transition nets (Petri nets) [48] GUI model x [51, 69] RTCM [103] IF language [60] Simulink/Stateflow [41,77,84,89] Lyra modelling [25] TA mapping model [96] [30,40,55,90,92,102] model-implementation (MI) description [46] TTCN-3 [28,56] MI mapping) [48] Z notation [34,49] MSC [56] MCMs [35,37] Organization for the Advancement of Structured Information Standards (OASIS)/Open Service Oriented Architecture (OSOA) [21] Palladio component model [65] PBM [27] QML [20,23,104] SBM [74] SIM [74] S# test models [66] specification and abstraction language for testing [100] Spec# [9,23,42] TCM [74] TTSs [54] TestingMM [37] threat MI d...…”
Section: Rq3: In Which Application Domains Is Mbt Applied To?mentioning
confidence: 99%
“…Few studies were classified as Experimental Study, Proof of Concepts and Theoretical, representing, respectively, 9.2% (8), 3.45% (3) and 4.6% (4). From the perspective of MBT activities, the most researched MBT activity of the primary studies [27] Gherkin language [68] predicate/transition nets (Petri nets) [48] GUI model x [51, 69] RTCM [103] IF language [60] Simulink/Stateflow [41,77,84,89] Lyra modelling [25] TA mapping model [96] [30,40,55,90,92,102] model-implementation (MI) description [46] TTCN-3 [28,56] MI mapping) [48] Z notation [34,49] MSC [56] MCMs [35,37] Organization for the Advancement of Structured Information Standards (OASIS)/Open Service Oriented Architecture (OSOA) [21] Palladio component model [65] PBM [27] QML [20,23,104] SBM [74] SIM [74] S# test models [66] specification and abstraction language for testing [100] Spec# [9,23,42] TCM [74] TTSs [54] TestingMM [37] threat MI d...…”
Section: Rq3: In Which Application Domains Is Mbt Applied To?mentioning
confidence: 99%
“…Las principales estrategias que utilizan las propuestas que juegan el rol de defensoras son:  Principio de monitoreo, detectando si algo pasa fuera de lo común, por lo general estas herramientas se basan en un proceso iterativo [20], [21].  Generación de casos de pruebas y ejecución de en determinados sitios web [16], [33].  Automatización de los procedimientos de prueba utilizando los requisitos de seguridad [21].…”
Section: Resultados Y Discusiónunclassified
“…They believe that the Extended Finite State Machine (EFSM) security model can be automatically generated through a formal description and point out that it is possible to generate test cases through model-checking techniques. Aouadi et al [ 76 ] designed an automatic formal testing tool for distributed systems. They improved the tool by developing a user interface and also proposed a method to automatically generate test objects, which saves time and increases efficiency.…”
Section: Automotive Cybersecurity Testing Methodsmentioning
confidence: 99%